






| Let p = 3 | q = 5 | n = p.q = 3.5 = 15 | phi = (3 − 1).(5 − 1) = 8 |
| p = 3 | q = 7 | n = 21 | phi = 12 | k.sub.1 = 5 | ||
| e.sub.1 = 3 | d.sub.1 = 17 | e.sub.2 = 2 | d.sub.2 = 5 | ||
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/847,503US7088821B2 (en) | 2001-05-03 | 2001-05-03 | Absolute public key cryptographic system and method surviving private-key compromise with other advantages |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US09/847,503US7088821B2 (en) | 2001-05-03 | 2001-05-03 | Absolute public key cryptographic system and method surviving private-key compromise with other advantages |
| Publication Number | Publication Date |
|---|---|
| US20020186848A1 US20020186848A1 (en) | 2002-12-12 |
| US7088821B2true US7088821B2 (en) | 2006-08-08 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US09/847,503Expired - LifetimeUS7088821B2 (en) | 2001-05-03 | 2001-05-03 | Absolute public key cryptographic system and method surviving private-key compromise with other advantages |
| Country | Link |
|---|---|
| US (1) | US7088821B2 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040047465A1 (en)* | 2002-09-09 | 2004-03-11 | Rohm Co., Ltd. | Enciphering and deciphering apparatus, and enciphering and deciphering method |
| US20050157872A1 (en)* | 2003-11-12 | 2005-07-21 | Takatoshi Ono | RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus |
| US20080144832A1 (en)* | 2006-12-18 | 2008-06-19 | Sap Ag | Secure computation of private values |
| US7522723B1 (en)* | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| US8190892B2 (en) | 2008-12-29 | 2012-05-29 | King Fahd University Of Petroleum & Minerals | Message authentication code with blind factorization and randomization |
| US20130083921A1 (en)* | 2010-07-23 | 2013-04-04 | Nippon Telegraph And Telephone Corporation | Encryption device, decryption device, encryption method, decryption method, program, and recording medium |
| US8462939B2 (en) | 2010-12-07 | 2013-06-11 | King Fahd University Of Petroleum And Minerals | RNS-based cryptographic system and method |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3401794A1 (en) | 2002-01-08 | 2018-11-14 | Seven Networks, LLC | Connection architecture for a mobile network |
| US7917468B2 (en) | 2005-08-01 | 2011-03-29 | Seven Networks, Inc. | Linking of personal information management data |
| US7853563B2 (en) | 2005-08-01 | 2010-12-14 | Seven Networks, Inc. | Universal data aggregation |
| US8468126B2 (en) | 2005-08-01 | 2013-06-18 | Seven Networks, Inc. | Publishing data in an information community |
| EP1596553B1 (en)* | 2004-05-11 | 2016-07-27 | Alcatel Lucent | Method of providing resources with restricted access |
| WO2006045102A2 (en) | 2004-10-20 | 2006-04-27 | Seven Networks, Inc. | Method and apparatus for intercepting events in a communication system |
| US8010082B2 (en) | 2004-10-20 | 2011-08-30 | Seven Networks, Inc. | Flexible billing architecture |
| US7706781B2 (en) | 2004-11-22 | 2010-04-27 | Seven Networks International Oy | Data security in a mobile e-mail service |
| FI117152B (en) | 2004-12-03 | 2006-06-30 | Seven Networks Internat Oy | E-mail service provisioning method for mobile terminal, involves using domain part and further parameters to generate new parameter set in list of setting parameter sets, if provisioning of e-mail service is successful |
| US7877703B1 (en) | 2005-03-14 | 2011-01-25 | Seven Networks, Inc. | Intelligent rendering of information in a limited display environment |
| US7796742B1 (en) | 2005-04-21 | 2010-09-14 | Seven Networks, Inc. | Systems and methods for simplified provisioning |
| US8438633B1 (en) | 2005-04-21 | 2013-05-07 | Seven Networks, Inc. | Flexible real-time inbox access |
| WO2006136660A1 (en) | 2005-06-21 | 2006-12-28 | Seven Networks International Oy | Maintaining an ip connection in a mobile network |
| US8069166B2 (en) | 2005-08-01 | 2011-11-29 | Seven Networks, Inc. | Managing user-to-user contact with inferred presence information |
| US7769395B2 (en) | 2006-06-20 | 2010-08-03 | Seven Networks, Inc. | Location-based operations and messaging |
| EP2122900A4 (en)* | 2007-01-22 | 2014-07-23 | Spyrus Inc | Portable data encryption device with configurable security functionality and method for file encryption |
| US8805425B2 (en) | 2007-06-01 | 2014-08-12 | Seven Networks, Inc. | Integrated messaging |
| US8693494B2 (en) | 2007-06-01 | 2014-04-08 | Seven Networks, Inc. | Polling |
| US8364181B2 (en) | 2007-12-10 | 2013-01-29 | Seven Networks, Inc. | Electronic-mail filtering for mobile devices |
| US8793305B2 (en) | 2007-12-13 | 2014-07-29 | Seven Networks, Inc. | Content delivery to a mobile device from a content service |
| US9002828B2 (en) | 2007-12-13 | 2015-04-07 | Seven Networks, Inc. | Predictive content delivery |
| US8107921B2 (en) | 2008-01-11 | 2012-01-31 | Seven Networks, Inc. | Mobile virtual network operator |
| US8862657B2 (en) | 2008-01-25 | 2014-10-14 | Seven Networks, Inc. | Policy based content service |
| US20090193338A1 (en) | 2008-01-28 | 2009-07-30 | Trevor Fiatal | Reducing network and battery consumption during content delivery and playback |
| US8787947B2 (en) | 2008-06-18 | 2014-07-22 | Seven Networks, Inc. | Application discovery on mobile devices |
| US8078158B2 (en) | 2008-06-26 | 2011-12-13 | Seven Networks, Inc. | Provisioning applications for a mobile device |
| US8909759B2 (en) | 2008-10-10 | 2014-12-09 | Seven Networks, Inc. | Bandwidth measurement |
| WO2011126889A2 (en) | 2010-03-30 | 2011-10-13 | Seven Networks, Inc. | 3d mobile user interface with configurable workspace management |
| WO2012018477A2 (en) | 2010-07-26 | 2012-02-09 | Seven Networks, Inc. | Distributed implementation of dynamic wireless traffic policy |
| CA2857458A1 (en) | 2010-07-26 | 2012-02-09 | Michael Luna | Mobile application traffic optimization |
| US8838783B2 (en) | 2010-07-26 | 2014-09-16 | Seven Networks, Inc. | Distributed caching for resource and mobile network traffic management |
| CA2806527A1 (en) | 2010-07-26 | 2012-02-09 | Seven Networks, Inc. | Mobile network traffic coordination across multiple applications |
| WO2012060996A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Caching adapted for mobile application behavior and network conditions |
| US8484314B2 (en) | 2010-11-01 | 2013-07-09 | Seven Networks, Inc. | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
| US8190701B2 (en) | 2010-11-01 | 2012-05-29 | Seven Networks, Inc. | Cache defeat detection and caching of content addressed by identifiers intended to defeat cache |
| US8843153B2 (en) | 2010-11-01 | 2014-09-23 | Seven Networks, Inc. | Mobile traffic categorization and policy for network use optimization while preserving user experience |
| WO2012060997A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Application and network-based long poll request detection and cacheability assessment therefor |
| WO2012061430A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed management of keep-alive message signaling for mobile network resource conservation and optimization |
| US9330196B2 (en) | 2010-11-01 | 2016-05-03 | Seven Networks, Llc | Wireless traffic management system cache optimization using http headers |
| WO2012060995A2 (en) | 2010-11-01 | 2012-05-10 | Michael Luna | Distributed caching in a wireless network of content delivered for a mobile application over a long-held request |
| US9060032B2 (en) | 2010-11-01 | 2015-06-16 | Seven Networks, Inc. | Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic |
| GB2500327B (en) | 2010-11-22 | 2019-11-06 | Seven Networks Llc | Optimization of resource polling intervals to satisfy mobile device requests |
| WO2012071283A1 (en) | 2010-11-22 | 2012-05-31 | Michael Luna | Aligning data transfer to optimize connections established for transmission over a wireless network |
| WO2012094675A2 (en) | 2011-01-07 | 2012-07-12 | Seven Networks, Inc. | System and method for reduction of mobile network traffic used for domain name system (dns) queries |
| GB2504411A (en) | 2011-04-19 | 2014-01-29 | Seven Networks Inc | Shared resource and virtual resource management in a networked environment |
| EP2702500B1 (en) | 2011-04-27 | 2017-07-19 | Seven Networks, LLC | Detecting and preserving state for satisfying application requests in a distributed proxy and cache system |
| GB2493473B (en) | 2011-04-27 | 2013-06-19 | Seven Networks Inc | System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief |
| WO2013015995A1 (en) | 2011-07-27 | 2013-01-31 | Seven Networks, Inc. | Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network |
| US8918503B2 (en) | 2011-12-06 | 2014-12-23 | Seven Networks, Inc. | Optimization of mobile traffic directed to private networks and operator configurability thereof |
| US8868753B2 (en) | 2011-12-06 | 2014-10-21 | Seven Networks, Inc. | System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation |
| US9277443B2 (en) | 2011-12-07 | 2016-03-01 | Seven Networks, Llc | Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol |
| US9009250B2 (en) | 2011-12-07 | 2015-04-14 | Seven Networks, Inc. | Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation |
| US8861354B2 (en) | 2011-12-14 | 2014-10-14 | Seven Networks, Inc. | Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization |
| EP2792188B1 (en) | 2011-12-14 | 2019-03-20 | Seven Networks, LLC | Mobile network reporting and usage analytics system and method using aggregation of data in a distributed traffic optimization system |
| US9832095B2 (en) | 2011-12-14 | 2017-11-28 | Seven Networks, Llc | Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic |
| EP2801236A4 (en) | 2012-01-05 | 2015-10-21 | Seven Networks Inc | Detection and management of user interactions with foreground applications on a mobile device in distributed caching |
| WO2013116856A1 (en) | 2012-02-02 | 2013-08-08 | Seven Networks, Inc. | Dynamic categorization of applications for network access in a mobile network |
| US9326189B2 (en) | 2012-02-03 | 2016-04-26 | Seven Networks, Llc | User as an end point for profiling and optimizing the delivery of content and data in a wireless network |
| US8812695B2 (en) | 2012-04-09 | 2014-08-19 | Seven Networks, Inc. | Method and system for management of a virtual network connection without heartbeat messages |
| US10263899B2 (en) | 2012-04-10 | 2019-04-16 | Seven Networks, Llc | Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network |
| WO2014011216A1 (en) | 2012-07-13 | 2014-01-16 | Seven Networks, Inc. | Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications |
| US9161258B2 (en) | 2012-10-24 | 2015-10-13 | Seven Networks, Llc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
| US9307493B2 (en) | 2012-12-20 | 2016-04-05 | Seven Networks, Llc | Systems and methods for application management of mobile device radio state promotion and demotion |
| US9271238B2 (en) | 2013-01-23 | 2016-02-23 | Seven Networks, Llc | Application or context aware fast dormancy |
| US8874761B2 (en) | 2013-01-25 | 2014-10-28 | Seven Networks, Inc. | Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols |
| US9326185B2 (en) | 2013-03-11 | 2016-04-26 | Seven Networks, Llc | Mobile network congestion recognition for optimization of mobile traffic |
| IN2013MU01234A (en)* | 2013-03-28 | 2015-04-10 | Tata Consultancy Services Ltd | |
| US9065765B2 (en) | 2013-07-22 | 2015-06-23 | Seven Networks, Inc. | Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network |
| US9529923B1 (en) | 2015-08-28 | 2016-12-27 | Swirlds, Inc. | Methods and apparatus for a distributed database within a network |
| US9390154B1 (en) | 2015-08-28 | 2016-07-12 | Swirlds, Inc. | Methods and apparatus for a distributed database within a network |
| US10747753B2 (en) | 2015-08-28 | 2020-08-18 | Swirlds, Inc. | Methods and apparatus for a distributed database within a network |
| WO2018000317A1 (en)* | 2016-06-30 | 2018-01-04 | Nokia Technologies Oy | Secure data processing |
| US20180115535A1 (en)* | 2016-10-24 | 2018-04-26 | Netflix, Inc. | Blind En/decryption for Multiple Clients Using a Single Key Pair |
| CA3042255A1 (en) | 2016-11-10 | 2018-05-17 | Swirlds, Inc. | Methods and apparatus for a distributed database including anonymous entries |
| CA3044071A1 (en) | 2016-12-19 | 2018-06-28 | Swirlds, Inc. | Methods and apparatus for a distributed database that enables deletion of events |
| EP3379769A1 (en)* | 2017-03-21 | 2018-09-26 | Gemalto Sa | Method of rsa signature or decryption protected using multiplicative splitting of an asymmetric exponent |
| SG10202103402RA (en) | 2017-07-11 | 2021-05-28 | Swirlds Inc | Methods and apparatus for efficiently implementing a distributed database within a network |
| US11418334B2 (en) | 2017-10-18 | 2022-08-16 | Cryptography Research, Inc. | Protecting modular inversion operation from external monitoring attacks |
| SG10202107812YA (en) | 2017-11-01 | 2021-09-29 | Swirlds Inc | Methods and apparatus for efficiently implementing a fast-copyable database |
| US11475150B2 (en) | 2019-05-22 | 2022-10-18 | Hedera Hashgraph, Llc | Methods and apparatus for implementing state proofs and ledger identifiers in a distributed database |
| CN110708136B (en)* | 2019-09-19 | 2023-01-31 | 杭州安恒信息技术股份有限公司 | Method for preventing and treating data leakage in network transmission process |
| DE102022129607A1 (en)* | 2022-11-09 | 2024-05-16 | Infineon Technologies Ag | CIRCUIT FOR COMBINED KEY-VALUE DEPENDENT EXCHANGE AND RANDOMIZATION OF TWO VALUES |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6084965A (en)* | 1995-05-17 | 2000-07-04 | Korea Telecommunication Authority | Identification scheme, digital signature scheme giving message recovery and digital signature scheme with appendix |
| US6810122B1 (en)* | 1999-07-23 | 2004-10-26 | Kabushiki Kaisha Toshiba | Secret sharing system and storage medium |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6084965A (en)* | 1995-05-17 | 2000-07-04 | Korea Telecommunication Authority | Identification scheme, digital signature scheme giving message recovery and digital signature scheme with appendix |
| US6810122B1 (en)* | 1999-07-23 | 2004-10-26 | Kabushiki Kaisha Toshiba | Secret sharing system and storage medium |
| Title |
|---|
| Moore, Judy H.; "Protocol Failures in Cryptosystems", May 1988; Proceedings of the IEEE, vol. 76, No. 5; pp. 594-602.* |
| Shamir, Adi; "RSA for Paranoids"; Autumn, 1995; CryptoBytes, pp. 1-16.* |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040047465A1 (en)* | 2002-09-09 | 2004-03-11 | Rohm Co., Ltd. | Enciphering and deciphering apparatus, and enciphering and deciphering method |
| US7317794B2 (en)* | 2002-09-09 | 2008-01-08 | Rohm Co., Ltd. | Enciphering and deciphering apparatus, and enciphering and deciphering method |
| US20050157872A1 (en)* | 2003-11-12 | 2005-07-21 | Takatoshi Ono | RSA public key generation apparatus, RSA decryption apparatus, and RSA signature apparatus |
| US7860244B2 (en)* | 2006-12-18 | 2010-12-28 | Sap Ag | Secure computation of private values |
| US20080144832A1 (en)* | 2006-12-18 | 2008-06-19 | Sap Ag | Secure computation of private values |
| US20110075846A1 (en)* | 2006-12-18 | 2011-03-31 | Sap Ag | Secure computation of private values |
| US8150041B2 (en) | 2006-12-18 | 2012-04-03 | Sap Ag | Secure computation of private values |
| US7522723B1 (en)* | 2008-05-29 | 2009-04-21 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| US20090300362A1 (en)* | 2008-05-29 | 2009-12-03 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| US8023647B2 (en)* | 2008-05-29 | 2011-09-20 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| US8831214B2 (en) | 2008-05-29 | 2014-09-09 | Cheman Shaik | Password self encryption method and system and encryption by keys generated from personal secret information |
| US8190892B2 (en) | 2008-12-29 | 2012-05-29 | King Fahd University Of Petroleum & Minerals | Message authentication code with blind factorization and randomization |
| US20130083921A1 (en)* | 2010-07-23 | 2013-04-04 | Nippon Telegraph And Telephone Corporation | Encryption device, decryption device, encryption method, decryption method, program, and recording medium |
| US8897442B2 (en)* | 2010-07-23 | 2014-11-25 | Nippon Telegraph And Telephone Corporation | Encryption device, decryption device, encryption method, decryption method, program, and recording medium |
| US8462939B2 (en) | 2010-12-07 | 2013-06-11 | King Fahd University Of Petroleum And Minerals | RNS-based cryptographic system and method |
| Publication number | Publication date |
|---|---|
| US20020186848A1 (en) | 2002-12-12 |
| Publication | Publication Date | Title |
|---|---|---|
| US7088821B2 (en) | Absolute public key cryptographic system and method surviving private-key compromise with other advantages | |
| Tatebayashi et al. | Key distribution protocol for digital mobile communication systems | |
| US8700894B2 (en) | Method and system for securing routing information of a communication using identity-based encryption scheme | |
| EP3091690B1 (en) | Rsa decryption using multiplicative secret sharing | |
| US7590236B1 (en) | Identity-based-encryption system | |
| US5796833A (en) | Public key sterilization | |
| Hsieh et al. | Anonymous authentication protocol based on elliptic curve Diffie–Hellman for wireless access networks | |
| Boneh et al. | Generating RSA keys on a handheld using an untrusted server | |
| Juang et al. | Anonymous channel and authentication in wireless communications | |
| Muhammad et al. | Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges | |
| Menezes et al. | On reusing ephemeral keys in diffie-hellman key agreement protocols | |
| Zheng | Shortened digital signature, signcryption and compact and unforgeable key agreement schemes | |
| Han | Generalization of signcryption for resources‐constrained environments | |
| Jeng et al. | An ECC-based blind signature scheme | |
| Marrok et al. | Pqh-wireguard: post-quantum hybrid cryptography-based wireguard vpn protocol | |
| JP4146252B2 (en) | Anonymous communication method capable of identifying unauthorized persons, user device used in the method, and relay server device | |
| Purevjav et al. | Email encryption using hybrid cryptosystem based on Android | |
| Boyd | Enforcing traceability in software | |
| US7035403B2 (en) | Encryption method and apparatus with escrow guarantees | |
| Witzke et al. | Key management for large scale end-to-end encryption | |
| Shim et al. | Security flaws in authentication and key establishment protocols for mobile communications | |
| Bashir et al. | Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields | |
| Shaik | Robust Public Key Cryptography—A New Cryptosystem Surviving Private Key Compromise | |
| Upadhyay | Attack on rsa cryptosystem | |
| Kim et al. | On the difficulty of key recovery systems |
| Date | Code | Title | Description |
|---|---|---|---|
| STCF | Information on status: patent grant | Free format text:PATENTED CASE | |
| AS | Assignment | Owner name:PALUS A32, LLC, DELAWARE Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SHAIK, CHEMAN;REEL/FRAME:020359/0660 Effective date:20071025 | |
| FPAY | Fee payment | Year of fee payment:4 | |
| FPAY | Fee payment | Year of fee payment:8 | |
| AS | Assignment | Owner name:F. POSZAT HU, L.L.C., DELAWARE Free format text:MERGER;ASSIGNOR:PALUS A32, LLC;REEL/FRAME:037379/0173 Effective date:20150812 | |
| MAFP | Maintenance fee payment | Free format text:PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553) Year of fee payment:12 | |
| AS | Assignment | Owner name:INTELLECTUAL VENTURES ASSETS 153 LLC, DELAWARE Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:F. POSZAT HU, L.L.C.;REEL/FRAME:050924/0857 Effective date:20191031 | |
| AS | Assignment | Owner name:KIOBA PROCESSING, LLC, GEORGIA Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTELLECTUAL VENTURES ASSETS 153 LLC;REEL/FRAME:051410/0205 Effective date:20191115 |